The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The introduction of self-* properties has been proven to be a feasible approach for the management demands of Disruption-Tolerant Networks (DTNs). Among the properties of the self-* management vision, self-healing figures as a key property to improve the dependability of the managed infrastructures. An interesting possibility to materialize self-* support in disruption-tolerant management is through...
For the problems of complex queries, load balance and routing efficiency in structured P2P networks based on DHT, a protocol is presented for text retrieval on the basis of Kleinberg small world model. In this protocol, nodes are clustered to support complex query according to the similarity of nodes, and the grouped nodes could adjust their size to balance the load of networks. Routing path length...
Modern networks not only forward traffic, but also perform a variety of processing operations on packets (e.g., content inspection, transcoding, QoS scheduling). Such data plane operations cannot be easily coordinated in the current Internet architectures since there is no explicit policy support for packet processing services. As more diverse systems and protocols are deployed in the next-generation...
The Internet of Things notion is sometimes being employed to signify the use of radio frequency identification (RFID) for tracking and tracing of products in supply chains. However, RFID is only one auto-ID technology among others. The world is already full of products with embedded identification, processing power, sensors etc. that can do much more than ordinary RFID tags. When such products will...
This paper describes a methodology for building a reliable internet core router that considers the vulnerability of its electronic components to single event upset (SEU). It begins with a set of meaningful system level metrics that can be related to product reliability requirements. A specification is then defined that can be effectively used during the system architecture, silicon and software design...
Collecting data on user activities is one of the fundamental middleware services in Web-enabled systems. The collected data is analyzed and used by various high-level services, like user profiling, accounting, security auditing, and system health monitoring. In this paper, we present architecture and performance evaluation of usage tracking components for service-oriented middleware systems. Presented...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.